DSA-4961-1 tor -- security update

Related Vulnerabilities: CVE-2021-38385  

Henry de Valence reported a flaw in the signature verification code in Tor, a connection-based low-latency anonymous communication system. A remote attacker can take advantage of this flaw to cause an assertion failure, resulting in denial of service. For the oldstable distribution (buster), this problem has been fixed in version 0.3.5.16-1. For the stable distribution (bullseye), this problem has been fixed in version 0.4.5.10-1~deb11u1. We recommend that you upgrade your tor packages. For the detailed security status of tor please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tor

Debian Security Advisory

DSA-4961-1 tor -- security update

Date Reported:
23 Aug 2021
Affected Packages:
tor
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2021-38385.
More information:

Henry de Valence reported a flaw in the signature verification code in Tor, a connection-based low-latency anonymous communication system. A remote attacker can take advantage of this flaw to cause an assertion failure, resulting in denial of service.

For the oldstable distribution (buster), this problem has been fixed in version 0.3.5.16-1.

For the stable distribution (bullseye), this problem has been fixed in version 0.4.5.10-1~deb11u1.

We recommend that you upgrade your tor packages.

For the detailed security status of tor please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tor